Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








10,993 Hits in 4.2 sec

ATM & Biometric Solutions: A Case Study

Yamna Sheikh, Muhammad Imran Majid
2019 International Journal of Experiential Learning & Case Studies  
The concept of automated houses and the use of objects with artif icial intelligence were of special interest.  ...  Of the various forms of scanning techniques, f ingerprint, iris, and facial have been selected as a security measure.  ...  Looking into the trends of ATM security the following are observed: Double Authentication One of the initial trends that were noted and proposed by Ganiyu et al.  ... 
doi:10.22555/ijelcs.v4i2.2543 fatcat:zekabwqxffacvln6krgb7tcbwe

Fingerprint Recognition based on Minutiae Information

Chandana Chandana, Surendra Yadav, Manish Mathuria
2015 International Journal of Computer Applications  
India focused on Recognition of Identity by using Fingerprint and Retina.  ...  The performance of Fingerprint Recognition is totally dependent on the Fingerprint Image Quality, because Fingerprint Recognition is the processing of Digital Image.  ...  It is a most popular biometric solution, refers to the automated method to confirmation the identity.  One to Importance of Fingerprint: Fingerprint is a very interesting and unique feature of the  ... 
doi:10.5120/21265-3862 fatcat:quo5ni7kbvfdxkzuxx3oksqtxy

Single-Qubit Optical Quantum Fingerprinting

Rolf T. Horn, S. A. Babichev, Karl-Peter Marzlin, A. I. Lvovsky, Barry C. Sanders
2005 Physical Review Letters  
We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart.  ...  For one-qubit fingerprinting of two-bit messages, we prepare 'tetrahedral' qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability  ...  (iv) present experimental results on the supply of fingerprint states that demonstrate the feasibility of the protocol.  ... 
doi:10.1103/physrevlett.95.150502 pmid:16241707 fatcat:4fyi47w2xjeyngwwwcvhsphjgm

Single-qubit optical quantum fingerprinting

Rolf T. Horn, Karl-Peter Marzlin, Barry C. Sanders, Ronald E. Meyers, Yanhua Shih
2004 Quantum Communications and Quantum Imaging II  
We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart.  ...  For one-qubit fingerprinting of two-bit messages, we prepare "tetrahedral" qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability  ...  (iv) present experimental results on the supply of fingerprint states that demonstrate the feasibility of the protocol.  ... 
doi:10.1117/12.562449 fatcat:kukxsrqzffenlc4qczr6objxfe

Multi-Factor Authentication Using Spectral Biometrics

Davar PISHVA
2007 Journal of Japan Society for Fuzzy Theory and Intelligent Informatics  
This paper describes the feasibility of enhancing existing biometrics technology with a spectroscopic method in order to prevent spoofing.  ...  Biometrics (also known as biometry) is defined as "the identification of an individual based on biological traits, such as fingerprints, iris patterns, and facial features" [1] , and relies on what a person  ...  A CCD/CMOS forms an image of the fingerprint by sensing the specular light reflectance from the valleys and the lack of reflectance at the ridges (i.e., the fingerprint image gets created from specular  ... 
doi:10.3156/jsoft.19.256 fatcat:pgr4j4vxbjekrpv3mzpnuegppm

Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security [article]

Debesh Choudhury
2018 arXiv   pre-print
One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint).  ...  The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.  ...  Simulation results verify the feasibility of the proposed cryptosystem. Figure 1 . 1 Double random phase encoding: (a) encryption algorithm, and (b) decryption algorithm.  ... 
arXiv:1810.07177v1 fatcat:pqzxj625lfhkjcmcsjlwagk4qa

Multi factor Authentication Model using Fingerprint Hash code and Iris Recognition

K. Krishna Prasad
2019 Zenodo  
Multi factor Authentication Model using Fingerprint Hash code and Iris Recognition by Krishna Prasad K.  ...  The fingerprint image is hashed through the double folded layer and salted enough.  ...  . he/she cannot break the system.  The fingerprint image s hashed through the  User does not need to remember anything; double folded layer and salted enough.  ... 
doi:10.5281/zenodo.2538228 fatcat:ikcyvsv3cfblrcfuaunwxbxb6e

Using fingerprint recognition system in a vaccine trial to avoid misclassification

Lorenz von Seidlein
2007 Bulletin of the World Health Organization  
Relevant changes An optical sensor was used to scan fingerprints. The fingerprint template of each participant was used to verify his or her identity during each of eight follow-up visits.  ...  All participants' identities were verified in the trial. Fingerprint recognition should become the standard technology for identification of participants in field trials.  ...  Discussion We found that fingerprint scanning for verification of identity during a clinical trial was feasible, reliable, and acceptable in adults in a rural area of Viet Nam.  ... 
doi:10.2471/blt.06.031070 pmid:17242760 pmcid:PMC2636211 fatcat:datkbfp5afecnpiktgm5q47vk4

A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE AND IRIS RECOGNITION

Krishna Prasad K, P Sreeramana Aithal
2019 Zenodo  
As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services.  ...  The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters.  ...  The fingerprint image is hashed through the double folded layer and salted enough.  ... 
doi:10.5281/zenodo.3407346 fatcat:emmsmbzqc5c6dlbuneq7rstbqu

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution [article]

Philip Bontrager, Aditi Roy, Julian Togelius, Nasir Memon, Arun Ross
2018 arXiv   pre-print
The proposed method, referred to as Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images.  ...  Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints.  ...  To design DeepMasterPrints, there needs to be a way to feasibly search the space of fingerprint images.  ... 
arXiv:1705.07386v4 fatcat:gu27y5nybffgbemvfnmuh5nopm

Signal Fingerprinting in Cognitive Wireless Networks

Simone Soderi, Giulio Dainelli, Matti Hamalainen, Jari Iinatti
2014 Proceedings of the 9th International Conference on Cognitive Radio Oriented Wireless Networks  
., denial-of-service (DoS). This paper introduces active radio frequency fingerprinting (RFF) with double application scenario.  ...  On the other hand, a node inside a network could use the same technique to exchange a public key during the setup of secure communication.  ...  Scenario The main objective of these simulations was to demonstrate the feasibility of the proposed method.  ... 
doi:10.4108/icst.crowncom.2014.255374 dblp:conf/crowncom/SoderiDIH14 fatcat:cem6mrz6vnfcdlgz2g7h6ifcda

Multifactor Authentication Model using Fingerprint Hash code and Iris Recognition

Krishna Prasad K.
2018 International journal of management, technology, and social science  
In recent years, the usage of Iris for human identification has substantially grown due to the tremendous advantages with traditional or usual or normal authentication techniques based on private identity  ...  As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services.  ...  The fingerprint image is hashed through the double folded layer and salted enough.  ... 
doi:10.47992/ijmts.2581.6012.0046 fatcat:jwclbfyt6ng27fbkgb6fwqcclu

Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing

Ahmed M. Ayoup, Ashraf A. M. Khalaf, Walid El-Shafai, Fathi E. Abd El-Samie, Fahad Alraddady, Salwa M. Serag Eldin
2022 Computers Materials & Continua  
First, a 2D matrix of size 128 × 128 is created based on Arnold's Cat Map (ACM).  ...  The simulation results obtained for performance evaluation show that the system is safe, reliable, and feasible as it achieves high security in the presence of noise.  ...  Acknowledgement: The authors thank the researchers of Taif University for their support. They support project number (TURSP-2020/214), Taif University, Taif, Saudi Arabia.  ... 
doi:10.32604/cmc.2022.025902 fatcat:6zssv3psgngdhn7zgvlvkx3rmu

A new digital currency system

Kees Van Hee, Jacob Wijngaard
2021 The Central European Review of Economics and Management  
So it proofs that such a system is feasible in principle. It is expected that the paper contributes to the discussion on CBDC systems.  ...  The system we describe, uses modern cryptography that guarantees privacy on the one hand but that allows for traceability on the other hand.  ...  This no double spending is one of the most important requirements of the system.  ... 
doi:10.29015/cerem.929 fatcat:l67wyiipsrhj3nompsctnm2yhm

Method and apparatus for extracting isolated speech word

Makoto Okazaki, Koji Eto
1994 Journal of the Acoustical Society of America  
The calculated values of voice fingerprint parameters then were passed to artificial neural networks, it was shown that using parameters values achieve high recognition rate, thus identifying the spoken  ...  In order to recognize the spoken word and the person who spoke the word some estimating parameters were chosen and calculated to form voice fingerprint.  ...  With a dictation system on your personal computer, on the other hand, it is feasible to ask the user to perform a hour or so of training in order to Fig. 1 : Calculating mu parameter build a recognition  ... 
doi:10.1121/1.408413 fatcat:4mznu5erjzah5byk6b6oypmncy
« Previous Showing results 1 — 15 out of 10,993 results